Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed before Apr 2023. There was 1 interview round.
Top trending discussions
I handle pressure by prioritizing tasks, taking breaks, and seeking support when needed.
I prioritize tasks based on urgency and importance
I take short breaks to clear my mind and recharge
I seek support from colleagues or supervisors when necessary
I maintain a positive attitude and focus on solutions rather than problems
I applied via LinkedIn and was interviewed in May 2021. There were 3 interview rounds.
Handled a critical situation with a customer
Identified the issue and its impact on the customer
Communicated effectively with the customer to understand their concerns
Collaborated with the team to find a solution
Implemented the solution and ensured customer satisfaction
Followed up with the customer to ensure the issue was resolved
NGFw stands for Next-Generation Firewall and it has advanced features compared to traditional firewalls.
NGFw can identify and block advanced threats like malware, ransomware, and phishing attacks.
It can perform deep packet inspection to analyze network traffic and detect anomalies.
NGFw can also provide application-level visibility and control to manage network traffic based on application usage.
It can integrate with ot...
SSL handshake and IPsec negotiation are both security protocols used to establish secure communication channels.
SSL handshake is used to establish secure communication between a client and a server over the internet.
IPsec negotiation is used to establish secure communication between two network devices.
SSL handshake uses a combination of public and private keys to encrypt and decrypt data.
IPsec negotiation uses a combi...
OWASP is a non-profit organization focused on improving software security. SSRF is a vulnerability that allows attackers to send requests from the server.
OWASP stands for Open Web Application Security Project
OWASP provides resources and tools to improve software security
SSRF (Server-Side Request Forgery) is a vulnerability that allows attackers to make requests from the server to internal or external resources
Attackers...
Exploit a vulnerable demo website to demonstrate technical skills.
Identify the vulnerability in the website (e.g. SQL injection, XSS)
Exploit the vulnerability to gain unauthorized access or perform malicious actions
Document the steps taken and potential impact of the exploit
Seeking new challenges and opportunities for growth in a dynamic work environment.
Looking for new challenges to enhance my skills and knowledge
Seeking opportunities for career advancement
Interested in working in a more dynamic and innovative environment
Yes, I am willing to work on hybrid mode.
I have experience working on hybrid applications using frameworks like Ionic or React Native.
I am comfortable with developing for both web and mobile platforms.
I understand the benefits of hybrid development in terms of cost and time efficiency.
Golang questions on threads
Uber App can be designed using AWS infra by leveraging services like EC2, S3, Lambda, API Gateway, RDS, and DynamoDB.
Use EC2 instances to host the backend services and databases.
Store user data and media files in S3 buckets.
Utilize Lambda functions for serverless computing and event-driven architecture.
Expose APIs through API Gateway for communication between different components.
Use RDS for relational database managem
posted on 13 Jun 2024
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
Around 1 hour with 2 coding and few aptitude questions.
Easy problem on java
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Senior Software Engineer
33
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
33
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
32
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
25
salaries
| ₹0 L/yr - ₹0 L/yr |
Consultant
22
salaries
| ₹0 L/yr - ₹0 L/yr |
Gen
McAfee
Palo Alto Networks
Check Point Software Technologies